Testimonials
Ridyasha R
India ·
June 2, 2025
I'm excited to share that I’ve successfully earned the Certified Web Application Penetration Tester (CWAPT) certification from Redfox Cybersecurity Academy.
It was a 𝟲-𝗵𝗼𝘂𝗿-𝗹𝗼𝗻𝗴 𝗲𝘅𝗮𝗺 + 𝗰𝗿𝗲𝗮𝘁𝗶𝗼𝗻 𝗼𝗳 𝗮 𝗽𝗿𝗼𝗳𝗲𝘀𝘀𝗶𝗼𝗻𝗮𝗹 𝗽𝗲𝗻𝘁𝗲𝘀𝘁 𝗿𝗲𝗽𝗼𝗿𝘁, during which I identified vulnerabilities like Broken Access Control, SQLi, CSRF, Clickjacking, IDOR, Business Logic Flaws and more. This experience enhanced my web app pentesting skills and helped me document findings effectively.
A big thank you to Tarak for making this bootcamp such an engaging and impactful journey!
It was a 𝟲-𝗵𝗼𝘂𝗿-𝗹𝗼𝗻𝗴 𝗲𝘅𝗮𝗺 + 𝗰𝗿𝗲𝗮𝘁𝗶𝗼𝗻 𝗼𝗳 𝗮 𝗽𝗿𝗼𝗳𝗲𝘀𝘀𝗶𝗼𝗻𝗮𝗹 𝗽𝗲𝗻𝘁𝗲𝘀𝘁 𝗿𝗲𝗽𝗼𝗿𝘁, during which I identified vulnerabilities like Broken Access Control, SQLi, CSRF, Clickjacking, IDOR, Business Logic Flaws and more. This experience enhanced my web app pentesting skills and helped me document findings effectively.
A big thank you to Tarak for making this bootcamp such an engaging and impactful journey!
Also grateful to Karan Patel and Redfox Cybersecurity Academy for providing such an opportunity.
Read more
Sahil M
India ·
June 2, 2025
Certified: CWAPT 🦊🔐
Thrilled to share that I've officially earned the CWAPT (Certified Web Application Penetration Tester) certification from Redfox Cybersecurity Academy!
This course was an intense deep dive into real-world web application exploitation techniques, packed with practical challenges and a rigorous hands-on exam that truly tested my skills and mindset.
Grateful to Tarak and the entire Redfox team for designing such a robust and impactful training experience.
Continuous learning is key in this field, and I’m proud to keep sharpening my craft.
Thrilled to share that I've officially earned the CWAPT (Certified Web Application Penetration Tester) certification from Redfox Cybersecurity Academy!
This course was an intense deep dive into real-world web application exploitation techniques, packed with practical challenges and a rigorous hands-on exam that truly tested my skills and mindset.
Grateful to Tarak and the entire Redfox team for designing such a robust and impactful training experience.
Continuous learning is key in this field, and I’m proud to keep sharpening my craft.
Read more
Prashant K
India ·
June 2, 2025
Earned my CWAPT certification, and it definitely lived up to the hype.
No fluff - just solid, hands-on training that dives deep into web application security. Every step of the way felt real, relevant, and designed to challenge how you think.
Appreciate the effort Tarak Sakhardande, Karan Patel and the folks at Redfox Cybersecurity Academy put into making this such a high-quality experience.
One more milestone down. On to what’s next.
Read more
Andile N
South Africa ·
May 28, 2025
Overall i am happy with the content and will recommend this course to my team.
Tanmay
India ·
May 28, 2025
Really good performance of the trainer. We were doing practicals for 40 minutes before the lecture. He gave us good tips and tricks and lots of good advice. He gave enough time for us to ask and clear our doubts as well. Amazing performance!
Read more
Yash M
India ·
May 28, 2025
My instructor, Mr. Tarak, was exceptionally detail-oriented. He thoroughly explained and addressed every question raised during the sessions. He was always willing to help, even if it meant revisiting the same topic multiple times to ensure complete clarity. He consistently provided real-world examples to explain vulnerabilities, making the topics much easier to understand. I truly appreciated his approach and clear mindset; he genuinely wanted to ensure that students were well-prepared for interviews and understood how professionals create reports. He was very strict and meticulous when it came to reporting, which greatly helped in developing attention to detail. The sessions were highly interactive - he often called out our names during discussions, making us feel connected and engaged. I never felt any discomfort during the sessions, even when asking what might seem like silly questions or topics. Overall, it was an amazing learning experience!
Read more
Arun K
May 28, 2025
This was seriously the best class of my entire life. I was literally developing goosebumps watching the sessions - it was so powerful and engrossing. I truly adored every single aspect of it and will for sure be showing a video testimonial to make my gratitude clear. I noticed the most clear and deep manner in which Sir presented each idea. Specifically, I liked valuable recommendations on avoiding prolonged use of mitm6 so that analysis will be facilitated - that kind of realistic guidance cannot be overstressed. Sir was also quite rigorous when explaining Active Directory ideas and doing so to enlighten someone regarding the behavior of websites internally - this had been astonishing as well as super educational to comprehend.
Read more
Yash M
India ·
May 28, 2025
Excited to share that I’ve completed the Certified Web Application Penetration Tester (CWAPT) exam!
The bootcamp covered a wide range of real-world web exploitation techniques - from Reconnaissance, IDOR, and Broken Access Control to Advanced SSRF, SSTI, XSS, SQLi, and more.
A huge thank you to Tarak Sakhardande, our incredible trainer, for being super friendly, always open to questions, and backing every vulnerability with real-life examples. Your teaching made all the difference!
Also grateful to Karan Patel and Redfox Cybersecurity Academy for giving me the opportunity to take this course and grow further in my AppSec journey.
The bootcamp covered a wide range of real-world web exploitation techniques - from Reconnaissance, IDOR, and Broken Access Control to Advanced SSRF, SSTI, XSS, SQLi, and more.
A huge thank you to Tarak Sakhardande, our incredible trainer, for being super friendly, always open to questions, and backing every vulnerability with real-life examples. Your teaching made all the difference!
Also grateful to Karan Patel and Redfox Cybersecurity Academy for giving me the opportunity to take this course and grow further in my AppSec journey.
Read more
Exiquio
USA ·
May 28, 2025
I've been a bit busy this week, but I just managed to revise Redfox Cybersecurity Academy's Windows Red Teaming Bootcamp Session 2.
This session started with a deep dive (an understatement) into the Kerberos protocol and how its authentication process works. I have yet to see any other course material go into this amount of detail. It brings clarity to common Kerberos-based attacks.
We then reviewed a few Kerberos attacks. In this area, the course was a bit light in my opinion (perhaps for good reason), but the attacks covered (i.e., user enumeration, password spraying, AS-REP roasting, and Kerberoasting) were explored relatively thoroughly.
The course then jumped into Kerberos delegation. This is an interesting attack vector to abuse. There was a detailed examination of two types of delegation and their respective exploitation, namely Constrained Delegation and Unconstrained Delegation. Resource-Based Constrained Delegation (RBCD) will be covered in the third session.
I am personally benefiting from this course by being walked through how things really work. Having failed the CRTP exam, I needed another look at the fundamentals of attacking Active Directory networks. This course provides that in spades.
To someone just starting AD pentesting, I believe this course will provide a more proper foundation than most others I've come across. You will know why you are doing X and Y, not just how to do them. Anyone can Google the latter. It's also an excellent complement to the Attacking and Defending AD course from Altered Security.
I'd like to thank Shashi Kant Prasad for another great set of lessons.
This session started with a deep dive (an understatement) into the Kerberos protocol and how its authentication process works. I have yet to see any other course material go into this amount of detail. It brings clarity to common Kerberos-based attacks.
We then reviewed a few Kerberos attacks. In this area, the course was a bit light in my opinion (perhaps for good reason), but the attacks covered (i.e., user enumeration, password spraying, AS-REP roasting, and Kerberoasting) were explored relatively thoroughly.
The course then jumped into Kerberos delegation. This is an interesting attack vector to abuse. There was a detailed examination of two types of delegation and their respective exploitation, namely Constrained Delegation and Unconstrained Delegation. Resource-Based Constrained Delegation (RBCD) will be covered in the third session.
I am personally benefiting from this course by being walked through how things really work. Having failed the CRTP exam, I needed another look at the fundamentals of attacking Active Directory networks. This course provides that in spades.
To someone just starting AD pentesting, I believe this course will provide a more proper foundation than most others I've come across. You will know why you are doing X and Y, not just how to do them. Anyone can Google the latter. It's also an excellent complement to the Attacking and Defending AD course from Altered Security.
I'd like to thank Shashi Kant Prasad for another great set of lessons.
Read more